By Topic

Access control in network management system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xiaoni Liu ; Sch. of Comput. Sci. & Technol., Xidian Univ., Xi''an, China ; Luyan Chen ; Cuiqin Duan

To conquer the problems existing in access control mechanisms available nowadays, such as how to manage the access authorities of the users and the protected resources, and how to keep the confidential data from visiting and modifying illegally, a new access control mechanism called multi-device TBPM-RBAC (MD-TBPM-RBAC) is proposed in this paper. According to the demand for unified users management in the network management system (NMS), MD-TBPM-RBAC uses Role-Based Access Control (RBAC) for the center, and expands the TBPM-RBAC. In MD-RBPM-RBAC, the users, resources and permissions are stored in the remote server, when a user lands, the device will communicate with the server to authenticate and authorize. As the MD-TBPM-RBAC implements the users' unified authentication and authorization, it manages the users centralized, protects the resources effectively, prevents the important resources from visiting illegally, and protects the critical processes from stopping illegally.

Published in:

Power Electronics and Intelligent Transportation System (PEITS), 2009 2nd International Conference on  (Volume:1 )

Date of Conference:

19-20 Dec. 2009